Description
The cookie authentication method in WordPress 2.5 relies on a hash of a concatenated string containing USERNAME and EXPIRY_TIME, which allows remote attackers to forge cookies by registering a username that results in the same concatenated string, as demonstrated by registering usernames beginning with "admin" to obtain administrator privileges, aka a "cryptographic splicing" issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-6013.
Remediation
References
Related Vulnerabilities
WordPress Multiple Cross-Site Scripting Vulnerabilities (2.0.11 - 2.3)
Oracle JRE CVE-2012-1541 Vulnerability (CVE-2012-1541)
WordPress Plugin Advanced Order Export For WooCommerce CSV Injection (1.5.4)
Joomla! Core 4.x.x Cross-Site Scripting (4.0.0 - 4.2.4)
Oracle Database Server CVE-2020-2515 Vulnerability (CVE-2020-2515)